Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include <string> | |
| 6 | |
| 7 #include "base/memory/ref_counted.h" | |
| 8 #include "base/memory/scoped_ptr.h" | |
| 9 #include "net/base/net_util.h" | |
| 10 #include "net/base/request_priority.h" | |
| 11 #include "net/dns/mock_host_resolver.h" | |
| 12 #include "net/http/http_auth_handler_mock.h" | |
| 13 #include "net/http/http_network_session.h" | |
| 14 #include "net/http/http_network_transaction.h" | |
| 15 #include "net/http/http_request_info.h" | |
| 16 #include "net/http/http_server_properties_impl.h" | |
| 17 #include "net/http/transport_security_state.h" | |
| 18 #include "net/proxy/proxy_service.h" | |
| 19 #include "net/socket/socket_test_util.h" | |
| 20 #include "testing/gtest/include/gtest/gtest.h" | |
| 21 | |
| 22 namespace net { | |
| 23 | |
| 24 namespace { | |
| 25 | |
| 26 class TLS1OnlySSLConfigService : public SSLConfigService { | |
|
wtc
2013/04/18 18:15:34
It seems wrong to call this SSLConfigService "TLS1
| |
| 27 public: | |
| 28 TLS1OnlySSLConfigService() { | |
| 29 ssl_config_.version_min = SSL_PROTOCOL_VERSION_SSL3; | |
| 30 ssl_config_.version_max = SSL_PROTOCOL_VERSION_TLS1; | |
| 31 } | |
| 32 | |
| 33 virtual void GetSSLConfig(SSLConfig* config) OVERRIDE { | |
| 34 *config = ssl_config_; | |
| 35 } | |
| 36 | |
| 37 private: | |
| 38 virtual ~TLS1OnlySSLConfigService() {} | |
| 39 | |
| 40 SSLConfig ssl_config_; | |
| 41 }; | |
| 42 | |
| 43 class TLS11SSLConfigService : public SSLConfigService { | |
| 44 public: | |
| 45 TLS11SSLConfigService() { | |
| 46 ssl_config_.version_min = SSL_PROTOCOL_VERSION_SSL3; | |
| 47 ssl_config_.version_max = SSL_PROTOCOL_VERSION_TLS1_1; | |
| 48 } | |
| 49 | |
| 50 virtual void GetSSLConfig(SSLConfig* config) OVERRIDE { | |
| 51 *config = ssl_config_; | |
| 52 } | |
| 53 | |
| 54 private: | |
| 55 virtual ~TLS11SSLConfigService() {} | |
| 56 | |
| 57 SSLConfig ssl_config_; | |
| 58 }; | |
| 59 | |
| 60 } // namespace | |
| 61 | |
| 62 class HttpNetworkTransactionSSLTest : public testing::Test { | |
| 63 protected: | |
| 64 virtual void SetUp() { | |
| 65 ssl_config_service_ = new TLS1OnlySSLConfigService; | |
| 66 session_params_.ssl_config_service = ssl_config_service_.get(); | |
| 67 | |
| 68 auth_handler_factory_.reset(new HttpAuthHandlerMock::Factory()); | |
| 69 session_params_.http_auth_handler_factory = auth_handler_factory_.get(); | |
| 70 | |
| 71 proxy_service_.reset(ProxyService::CreateDirect()); | |
| 72 session_params_.proxy_service = proxy_service_.get(); | |
| 73 | |
| 74 session_params_.client_socket_factory = &mock_socket_factory_; | |
| 75 session_params_.host_resolver = &mock_resolver_; | |
| 76 session_params_.http_server_properties = &http_server_properties_; | |
| 77 session_params_.transport_security_state = &transport_security_state_; | |
| 78 } | |
| 79 | |
| 80 HttpRequestInfo* GetRequestInfo(std::string url) { | |
| 81 HttpRequestInfo* request_info = new HttpRequestInfo; | |
| 82 request_info->url = GURL(url); | |
| 83 request_info->method = "GET"; | |
| 84 return request_info; | |
| 85 } | |
| 86 | |
| 87 SSLConfig& GetServerSSLConfig(HttpNetworkTransaction* trans) { | |
| 88 return trans->server_ssl_config_; | |
| 89 } | |
| 90 | |
| 91 scoped_refptr<SSLConfigService> ssl_config_service_; | |
| 92 scoped_ptr<HttpAuthHandlerMock::Factory> auth_handler_factory_; | |
| 93 scoped_ptr<ProxyService> proxy_service_; | |
| 94 | |
| 95 MockClientSocketFactory mock_socket_factory_; | |
| 96 MockHostResolver mock_resolver_; | |
| 97 HttpServerPropertiesImpl http_server_properties_; | |
| 98 TransportSecurityState transport_security_state_; | |
| 99 HttpNetworkSession::Params session_params_; | |
| 100 }; | |
| 101 | |
| 102 // Tests that HttpNetworkTransaction does not attempt to | |
| 103 // fallback to SSL 3.0 when a TLS 1.0 handshake fails and: | |
| 104 // * the site is pinned to the Google pin list (indicating that | |
| 105 // it is a Google site); | |
| 106 // * SSL 3.0 fallback is disabled. | |
|
wtc
2013/04/18 18:15:34
All instances of "SSL 3.0 fallback" in this file s
| |
| 107 TEST_F(HttpNetworkTransactionSSLTest, SSL3FallbackDisabled_Google) { | |
| 108 // |ssl_data1| is for the first handshake (TLS 1.0), which will fail for | |
| 109 // protocol reasons (e.g., simulating a version rollback attack). | |
| 110 // Because SSL 3.0 fallback is disabled, only this simulated SSL handshake | |
| 111 // is consumed. | |
| 112 SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_PROTOCOL_ERROR); | |
| 113 mock_socket_factory_.AddSSLSocketDataProvider(&ssl_data1); | |
| 114 StaticSocketDataProvider data1(NULL, 0, NULL, 0); | |
| 115 mock_socket_factory_.AddSocketDataProvider(&data1); | |
| 116 | |
| 117 // This extra handshake, which should be unconsumed, is provided to ensure | |
| 118 // that even if the behaviour being tested here ever breaks (and Google | |
| 119 // properties begin SSL 3.0 fallbacks), this test will not crash (and bring | |
| 120 // down all of net_unittests), but it will fail gracefully. | |
| 121 SSLSocketDataProvider ssl_data2(ASYNC, ERR_SSL_PROTOCOL_ERROR); | |
| 122 mock_socket_factory_.AddSSLSocketDataProvider(&ssl_data2); | |
| 123 StaticSocketDataProvider data2(NULL, 0, NULL, 0); | |
| 124 mock_socket_factory_.AddSocketDataProvider(&data2); | |
| 125 | |
| 126 scoped_refptr<HttpNetworkSession> session( | |
| 127 new HttpNetworkSession(session_params_)); | |
| 128 scoped_ptr<HttpNetworkTransaction> trans( | |
| 129 new HttpNetworkTransaction(DEFAULT_PRIORITY, session)); | |
| 130 | |
| 131 TestCompletionCallback callback; | |
| 132 // This will consume only |ssl_data1|. |ssl_data2| will not be consumed. | |
| 133 int rv = callback.GetResult( | |
| 134 trans->Start(GetRequestInfo("https://www.google.com/"), | |
| 135 callback.callback(), BoundNetLog())); | |
| 136 EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv); | |
| 137 | |
| 138 SocketDataProviderArray<SocketDataProvider>& mock_data = | |
| 139 mock_socket_factory_.mock_data(); | |
| 140 // Confirms that only |ssl_data1| is consumed. | |
| 141 EXPECT_EQ(1u, mock_data.next_index()); | |
| 142 | |
| 143 SSLConfig& ssl_config = GetServerSSLConfig(trans.get()); | |
| 144 // |version_max| never fallbacks to SSLv3 for Google properties. | |
| 145 EXPECT_EQ(SSL_PROTOCOL_VERSION_TLS1, ssl_config.version_max); | |
| 146 EXPECT_FALSE(ssl_config.version_fallback); | |
| 147 } | |
| 148 | |
| 149 // Tests that HttpNetworkTransaction attempts to fallback to SSL 3.0 | |
| 150 // when a TLS 1.0 handshake fails and: | |
| 151 // * the site is pinned to the Google pin list (indicating that | |
| 152 // it is a Google site); | |
| 153 // * SSL 3.0 fallback is enabled. | |
| 154 TEST_F(HttpNetworkTransactionSSLTest, SSL3FallbackEnabled_Google) { | |
| 155 // |ssl_data1| is for the first handshake (TLS 1.0), which will fail for | |
| 156 // protocol reasons (e.g., simulating a version rollback attack). | |
| 157 SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_PROTOCOL_ERROR); | |
| 158 mock_socket_factory_.AddSSLSocketDataProvider(&ssl_data1); | |
| 159 StaticSocketDataProvider data1(NULL, 0, NULL, 0); | |
| 160 mock_socket_factory_.AddSocketDataProvider(&data1); | |
| 161 | |
| 162 // |ssl_data2| contains the handshake result for a SSL 3.0 | |
| 163 // handshake which will be attempted after the TLS 1.0 | |
| 164 // handshake fails. | |
| 165 SSLSocketDataProvider ssl_data2(ASYNC, ERR_SSL_PROTOCOL_ERROR); | |
| 166 mock_socket_factory_.AddSSLSocketDataProvider(&ssl_data2); | |
| 167 StaticSocketDataProvider data2(NULL, 0, NULL, 0); | |
| 168 mock_socket_factory_.AddSocketDataProvider(&data2); | |
| 169 | |
| 170 scoped_refptr<HttpNetworkSession> session( | |
| 171 new HttpNetworkSession(session_params_)); | |
| 172 scoped_ptr<HttpNetworkTransaction> trans( | |
| 173 new HttpNetworkTransaction(DEFAULT_PRIORITY, session)); | |
| 174 | |
| 175 SSLConfig& ssl_config = GetServerSSLConfig(trans.get()); | |
| 176 ssl_config.ssl3_fallback_enabled = true; | |
| 177 | |
| 178 TestCompletionCallback callback; | |
| 179 // This will consume |ssl_data1| and |ssl_data2|. | |
| 180 int rv = callback.GetResult( | |
| 181 trans->Start(GetRequestInfo("https://www.google.com/"), | |
| 182 callback.callback(), BoundNetLog())); | |
| 183 EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv); | |
| 184 | |
| 185 SocketDataProviderArray<SocketDataProvider>& mock_data = | |
| 186 mock_socket_factory_.mock_data(); | |
| 187 // Confirms that both |ssl_data1| and |ssl_data2| are consumed. | |
| 188 EXPECT_EQ(2u, mock_data.next_index()); | |
| 189 | |
| 190 // |version_max| fallbacks to SSL 3.0 for Google properties when | |
| 191 // |ssl3_fallback_enabled| is true. | |
| 192 EXPECT_EQ(SSL_PROTOCOL_VERSION_SSL3, ssl_config.version_max); | |
| 193 EXPECT_TRUE(ssl_config.version_fallback); | |
| 194 } | |
| 195 | |
| 196 // Tests that HttpNetworkTransaction attempts to fallback to SSL 3.0 | |
| 197 // when a TLS 1.0 handshake fails and the site is not a Google domain, | |
| 198 // even if SSL 3.0 fallback is disabled. | |
| 199 // TODO(thaidn): revise the above comment and this test when the | |
| 200 // SSL 3.0 fallback experiment is applied for non-Google domains. | |
| 201 TEST_F(HttpNetworkTransactionSSLTest, SSL3FallbackDisabled_Paypal) { | |
| 202 // |ssl_data1| is for the first handshake (TLS 1.0), which will fail | |
| 203 // for protocol reasons (e.g., simulating a version rollback attack). | |
| 204 SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_PROTOCOL_ERROR); | |
| 205 mock_socket_factory_.AddSSLSocketDataProvider(&ssl_data1); | |
| 206 StaticSocketDataProvider data1(NULL, 0, NULL, 0); | |
| 207 mock_socket_factory_.AddSocketDataProvider(&data1); | |
| 208 | |
| 209 // |ssl_data2| contains the handshake result for a SSL 3.0 | |
| 210 // handshake which will be attempted after the TLS 1.0 | |
| 211 // handshake fails. | |
| 212 SSLSocketDataProvider ssl_data2(ASYNC, ERR_SSL_PROTOCOL_ERROR); | |
| 213 mock_socket_factory_.AddSSLSocketDataProvider(&ssl_data2); | |
| 214 StaticSocketDataProvider data2(NULL, 0, NULL, 0); | |
| 215 mock_socket_factory_.AddSocketDataProvider(&data2); | |
| 216 | |
| 217 scoped_refptr<HttpNetworkSession> session( | |
| 218 new HttpNetworkSession(session_params_)); | |
| 219 scoped_ptr<HttpNetworkTransaction> trans( | |
| 220 new HttpNetworkTransaction(DEFAULT_PRIORITY, session)); | |
| 221 | |
| 222 TestCompletionCallback callback; | |
| 223 // This will consume |ssl_data1| and |ssl_data2|. | |
| 224 int rv = callback.GetResult( | |
| 225 trans->Start(GetRequestInfo("https://www.paypal.com/"), | |
| 226 callback.callback(), BoundNetLog())); | |
| 227 EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv); | |
| 228 | |
| 229 SocketDataProviderArray<SocketDataProvider>& mock_data = | |
| 230 mock_socket_factory_.mock_data(); | |
| 231 // Confirms that both |ssl_data1| and |ssl_data2| are consumed. | |
| 232 EXPECT_EQ(2u, mock_data.next_index()); | |
| 233 | |
| 234 SSLConfig& ssl_config = GetServerSSLConfig(trans.get()); | |
| 235 // |version_max| fallbacks to SSL 3.0. | |
| 236 EXPECT_EQ(SSL_PROTOCOL_VERSION_SSL3, ssl_config.version_max); | |
| 237 EXPECT_TRUE(ssl_config.version_fallback); | |
| 238 } | |
| 239 | |
| 240 // Tests that HttpNetworkTransaction attempts to fallback from | |
| 241 // TLS 1.1 to TLS 1.0, then from TLS 1.0 to SSL 3.0. | |
| 242 TEST_F(HttpNetworkTransactionSSLTest, SSLFallback) { | |
| 243 ssl_config_service_ = new TLS11SSLConfigService; | |
| 244 session_params_.ssl_config_service = ssl_config_service_.get(); | |
| 245 // |ssl_data1| is for the first handshake (TLS 1.1), which will fail for | |
| 246 // protocol reasons (e.g., simulating a version rollback attack). | |
| 247 SSLSocketDataProvider ssl_data1(ASYNC, ERR_SSL_PROTOCOL_ERROR); | |
| 248 mock_socket_factory_.AddSSLSocketDataProvider(&ssl_data1); | |
| 249 StaticSocketDataProvider data1(NULL, 0, NULL, 0); | |
| 250 mock_socket_factory_.AddSocketDataProvider(&data1); | |
| 251 | |
| 252 // |ssl_data2| contains the handshake result for a TLS 1.0 | |
| 253 // handshake which will be attempted after the TLS 1.1 | |
| 254 // handshake fails. | |
| 255 SSLSocketDataProvider ssl_data2(ASYNC, ERR_SSL_PROTOCOL_ERROR); | |
| 256 mock_socket_factory_.AddSSLSocketDataProvider(&ssl_data2); | |
| 257 StaticSocketDataProvider data2(NULL, 0, NULL, 0); | |
| 258 mock_socket_factory_.AddSocketDataProvider(&data2); | |
| 259 | |
| 260 // |ssl_data3| contains the handshake result for a SSL 3.0 | |
| 261 // handshake which will be attempted after the TLS 1.0 | |
| 262 // handshake fails. | |
| 263 SSLSocketDataProvider ssl_data3(ASYNC, ERR_SSL_PROTOCOL_ERROR); | |
| 264 mock_socket_factory_.AddSSLSocketDataProvider(&ssl_data3); | |
| 265 StaticSocketDataProvider data3(NULL, 0, NULL, 0); | |
| 266 mock_socket_factory_.AddSocketDataProvider(&data3); | |
| 267 | |
| 268 scoped_refptr<HttpNetworkSession> session( | |
| 269 new HttpNetworkSession(session_params_)); | |
| 270 scoped_ptr<HttpNetworkTransaction> trans( | |
| 271 new HttpNetworkTransaction(DEFAULT_PRIORITY, session)); | |
| 272 | |
| 273 TestCompletionCallback callback; | |
| 274 // This will consume |ssl_data1|, |ssl_data2| and |ssl_data3|. | |
| 275 int rv = callback.GetResult( | |
| 276 trans->Start(GetRequestInfo("https://www.paypal.com/"), | |
| 277 callback.callback(), BoundNetLog())); | |
| 278 EXPECT_EQ(ERR_SSL_PROTOCOL_ERROR, rv); | |
| 279 | |
| 280 SocketDataProviderArray<SocketDataProvider>& mock_data = | |
| 281 mock_socket_factory_.mock_data(); | |
| 282 // Confirms that |ssl_data1|, |ssl_data2| and |ssl_data3| are consumed. | |
| 283 EXPECT_EQ(3u, mock_data.next_index()); | |
| 284 | |
| 285 SSLConfig& ssl_config = GetServerSSLConfig(trans.get()); | |
| 286 // |version_max| fallbacks to SSL 3.0. | |
| 287 EXPECT_EQ(SSL_PROTOCOL_VERSION_SSL3, ssl_config.version_max); | |
| 288 EXPECT_TRUE(ssl_config.version_fallback); | |
| 289 } | |
| 290 | |
| 291 } // namespace net | |
| 292 | |
| OLD | NEW |